[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MFSA 2013-51: Privileged content access and execution via XBL

ID: oval:org.secpod.oval:def:15000Date: (C)2013-09-01   (M)2024-03-27
Class: PATCHFamily: windows




Security researcher Mariusz Mlynski reported that it is possible to compile a user-defined function in the XBL scope of a specific element and then trigger an event within this scope to run code. In some circumstances, when this code is run, it can access content protected by SystemOnly Wrappers (SOW) and chrome-privileged pages. This could potentially lead to arbitrary code execution. Additionally, Chrome Object Wrappers (COW) can be bypassed by web content to access privileged methods, leading to a cross-site scripting (XSS) attack from privileged pages.

Platform:
Microsoft Windows Server 2022
Microsoft Windows 11
Microsoft Windows Server 2019
Microsoft Windows Server 2016
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Microsoft Windows 10
Product:
Mozilla Thunderbird
Mozilla SeaMonkey
Mozilla Firefox
Mozilla Firefox ESR
Mozilla Thunderbird ESR
Reference:
MFSA 2013-51
CVE-2013-1687
CVE    1
CVE-2013-1687
CPE    32
cpe:/a:mozilla:firefox_esr:17.0
cpe:/a:mozilla:thunderbird:::x86
cpe:/a:mozilla:firefox_esr:::x86
cpe:/a:mozilla:firefox:::x86
...

© SecPod Technologies